US7219844B2 - Methods for protecting a smart card - Google Patents

Methods for protecting a smart card Download PDF

Info

Publication number
US7219844B2
US7219844B2 US10/473,815 US47381504A US7219844B2 US 7219844 B2 US7219844 B2 US 7219844B2 US 47381504 A US47381504 A US 47381504A US 7219844 B2 US7219844 B2 US 7219844B2
Authority
US
United States
Prior art keywords
microcircuit
battery
electronic entity
processor
entity according
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US10/473,815
Other versions
US20040145339A1 (en
Inventor
Paul Dischamp
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia France SAS
Original Assignee
Oberthur Card Systems SA France
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oberthur Card Systems SA France filed Critical Oberthur Card Systems SA France
Assigned to OBERTHUR CARD SYSTEMS SA reassignment OBERTHUR CARD SYSTEMS SA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DISCHAMP, PAUL
Publication of US20040145339A1 publication Critical patent/US20040145339A1/en
Application granted granted Critical
Publication of US7219844B2 publication Critical patent/US7219844B2/en
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07363Means for preventing undesired reading or writing from or onto record carriers by preventing analysis of the circuit, e.g. dynamic or static power analysis or current analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0701Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
    • G06K19/0702Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery
    • G06K19/0704Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery the battery being rechargeable, e.g. solar batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the invention relates to a method of protecting an electronic entity including a microcircuit, in particular a microcircuit card with encrypted access, said protection being aimed more particularly at forms of attack known as “current analysis”.
  • the invention also relates to an electronic entity including a microcircuit, in particular a microcircuit card with encrypted access, equipped with means for obtaining the protection offered by said method.
  • a standard attack consists in having the electronic entity that has fallen into the hands of the fraudster execute a certain number of cryptographic protocols based on random messages, which are therefore bound to fail, but cause the entity (the microcircuit card) to execute each time a cryptographic algorithm, for example the DES (DATA ENCRYPTION STANDARD) algorithm, and analyzing the current consumed during each execution of said DES algorithm.
  • the object of this attack is to discover the secret key of said entity.
  • the DES algorithm is very widely used at present in the field of bank cards, SIM (GSM) cards, pay per view television access cards, and access control cards.
  • the fraudster can connect said card to a reader by means of which he can transmit messages to it and connect it to means for recording the current consumed by the microcircuit during the execution of the operations that it carries out.
  • the fraudster instigates multiple execution of the DES algorithm and the current consumption is detected and memorized each time. From all of this data, and in particular from the current consumption measurements, it is possible to mount attacks whose principle is well known.
  • SPA-DPA Simple Power Analysis/Differential Power Analysis
  • the invention provides a method of protecting a microcircuit electronic entity such as a microcircuit card against current analysis attack, of the type consisting in associating with said microcircuit an energy store placed inside said entity, characterized in that, during an exchange of information in which said entity is coupled to a server adapted to provide it with an electrical power supply, at least a portion of said microcircuit is supplied with electrical power provided by said energy store during the execution of predetermined operations by said at least one portion of said microcircuit, said server supplying electrical power to said microcircuit during the execution of other operations.
  • the aforementioned energy store can be a battery, preferably a rechargeable battery.
  • the battery can be charged on each transaction, i.e. each time that the electronic entity is coupled to a server capable of supplying to it the necessary electrical energy.
  • the microcircuit is preferably designed and programmed to command charging of the battery outside time periods in which it is being used to supply power to the microcircuit or the portion of the microcircuit responsible for executing said predetermined operations.
  • said battery can be charged with solar energy by means of a photoelectric cell integrated into the electronic entity.
  • a photoelectric cell integrated into the electronic entity.
  • the aforementioned predetermined operations during which the microcircuit or a portion thereof is supplied with power internally and not by the server to which the electronic entity is connected are all exchanges of “sensitive” information, during which confidential data is exchanged.
  • These operations are, for example, cryptographic algorithms during which keys are used or exchanged, the procedure for verifying the PIN, etc.
  • said predetermined operations can be executed by a coprocessor supplied with power by said battery while other operations are executed by a main processor supplied with power by said server.
  • Another solution is to switch a main processor so that it is supplied with power by said battery while it is executing said predetermined “sensitive” operations, during which time periods said server supplies power to a decoy circuit, which continues to carry out operations and therefore to simulate consumption of current.
  • the simulated current consumption is independent of the sensitive predetermined operations that are being executed at that time. This makes it impossible to recover sensitive data such as cryptographic keys, the PIN, etc. from a recording of the power supply current. Because the necessary current is being supplied by a battery or a rechargeable battery situated inside the electronic entity including the microcircuit, no information of interest relating to the operating status of the processor can “leak” out of the card, via the analysis of the current supplied by the server.
  • the service life thereof is relatively long since said battery is used only to execute small program portions and not for all of the operations constituting a transaction between said electronic entity and the server.
  • the use of a decoy or a coprocessor prevents an attacker from being able to determine the times at which the sensitive portions of the program are executed since, during those time intervals, the microcircuit continues to carry out operations, consuming current supplied by the external server.
  • the invention also provides an encrypted access electronic entity comprising a microcircuit and means for coupling the latter to a server itself provided with electrical power supply means for supplying power to said microcircuit via said coupling means, characterized in that it further includes an integrated energy store and selector means adapted to switch the power supply of at least a portion of said microcircuit to said energy store when predetermined operations are being executed by said at least one portion of said microcircuit.
  • said selector means include a multiplexer or the like controlled by a processor of said microcircuit.
  • the multiplexer has two inputs, one connected to a contact terminal for the connection to the electrical power supply means of said server and the other connected to said energy store.
  • An output of said multiplexer is connected to an electrical power supply line of the processor.
  • the processor commands the multiplexer to make the selection between the electrical power supply means of said server and said energy store integrated into said electronic entity.
  • the aforementioned contact terminal is one of the electrical contact regions that are usually found on the surface of a microcircuit card of the bank card or access control card type.
  • some cards can be equipped with an antenna adapted to be coupled to an antenna situated in the server.
  • the antenna system is used both for exchanging information and for supplying sufficient electrical energy to power the microcircuit.
  • the invention also applies to this type of card, and in this case one of the inputs of the multiplexer is connected to a power supply circuit receiving its energy from the antenna integrated into the electronic entity (the card).
  • FIG. 1 is a diagrammatic view in section of a microcircuit card connected to a server and equipped with the improvement according to the invention
  • FIG. 2 is a block diagram of a first embodiment of an electronic entity according to the invention.
  • FIG. 3 is a similar block diagram, showing another embodiment.
  • FIG. 4 is another block diagram, showing a further embodiment.
  • FIG. 1 there is shown an electronic entity in the form of a microcircuit card 11 equipped with the improvement according to the invention and shown connected to a server 12 including an electrical power supply adapted to supply the electrical energy 13 necessary for the microcircuit housed in a cavity in the card to function.
  • the microcircuit 15 is accessible from the outside via a number of metal connection regions flush with the surface of the card.
  • One of these regions constitutes a contact terminal 16 a connected to one pole of the power supply 13 via a rubbing contact member.
  • Another connection region constitutes a contact terminal 16 b connected to the other pole of the power supply (connected to ground).
  • the other connection regions enable exchange of information between the microcircuit and the server.
  • a battery or a rechargeable battery 19 is accommodated within the thickness of the card.
  • the microcircuit includes selector means, for example essentially constituted of a multiplexer 20 or the like.
  • the multiplexer is connected both to the contact terminal 16 a intended to be connected to the electrical power supply of the server 12 and to one pole of the battery 19 housed within the thickness of the card.
  • the other pole of the battery is connected to ground.
  • FIG. 2 shows in more detail the general arrangement of the microcircuit 15 and its connection to one pole of the battery 19 .
  • the microcircuit essentially consists of a processor P, a memory unit M, and a multiplexer 20 with two inputs and one output.
  • power supply electrical connections are shown in continuous line and control or information exchange connections are shown in dashed line.
  • One input of the multiplexer is connected to the contact terminal 16 a and the other input is connected to one pole of the battery 19 .
  • the multiplexer constitutes selector means adapted to switch the power supply of at least one portion of the microcircuit 15 , in this instance the whole of the processor P, to the integral battery 19 when predetermined operations are being executed by the processor.
  • the predetermined operations in question are the sensitive operations defined hereinabove.
  • the output of the multiplexer is connected to an electrical power supply line 22 of the processor.
  • the multiplexer ( 20 ) is controlled by the processor P (control connection 23 ) to select either the electrical power supply 13 of the server or the battery.
  • the battery 19 can be a simple non-rechargeable battery. The long service life of the battery is the result of the fact that it supplies power to the processor for only a small portion of the operating time of the card, i.e. when the latter is effecting sensitive operations.
  • the processor is supplied with power by the power supply 13 of the server, via the contact terminal 16 a and the multiplexer 20 , which is set accordingly by a control signal applied via the control connection 23 .
  • the microcircuit further includes a circuit 25 for charging the battery 19 , which is rechargeable.
  • the charging circuit 25 is connected between the contact terminal 16 a and the battery 19 . It is commanded by the processor P to recharge the battery when the processor is being supplied with power via the server, i.e. by the power supply 13 .
  • the card also incorporates a photoelectric cell 27 connected to charge the battery 19 .
  • this photoelectric cell is connected to the charging circuit 25 , which regulates the current, but it is not obligatory for selection of the photoelectric cell 27 to be controlled by the processor.
  • the photoelectric cell can be connected to charge the battery at least partially when it receives sufficient illumination.
  • the microcircuit 15 can include a decoy circuit 29 that is directly connected to the server coupling means, i.e. to the connection terminal 16 a .
  • This decoy circuit is commanded to execute operations when the remainder of the microcircuit or at least the portion thereof which executes said predetermined operations is being supplied with power by the battery 19 .
  • the microcircuit 15 includes a main processor P 0 and a coprocessor P 1 .
  • the latter is dedicated to the execution of said predetermined operations.
  • the multiplexer 20 a has two inputs and two outputs, forming a kind of double-pole switch, one of the switch poles being open when the other is closed, and vice-versa.
  • the contact terminal 16 a is connected to one of the inputs and the corresponding output is connected to the electrical power supply line 22 a of the main processor.
  • One of the terminals of the battery 19 is connected to the other input and the corresponding output is connected to the power supply line 22 b of the coprocessor P 1 .
  • the main processor and the coprocessor are associated with a memory unit M.
  • One of the two processors for example the main processor, controls the selector means via a control connection 23 .
  • the coprocessor is supplied with power only by the battery via the selector means.
  • FIG. 3 embodiment Simplifying the FIG. 3 embodiment by connecting the power supply line 22 a of the processor P 0 directly to the contact terminal 16 a can be envisaged.
  • the multiplexer 20 a is then equivalent to a simple switch controlled by the processor P 0 .
  • the processor P 0 it is advantageous for the processor P 0 to continue to execute operations (act as a decoy) when the coprocessor P 1 is in service.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Sustainable Development (AREA)
  • Sustainable Energy (AREA)
  • Mathematical Physics (AREA)
  • Power Sources (AREA)
  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)
  • Slot Machines And Peripheral Devices (AREA)

Abstract

A method for protecting an electronic entity such as a smart card, against simple/differential power analysis, by integrating a current accumulator in said entity. The current accumulator (19) powers a processor (P) via a multiplexer (20) when the processor is loaded to execute so-called sensitive operations.

Description

This is a National Stage application of PCT Application PCT/FR02/01058 filed Mar. 27, 2002 that claims the priority of French Application 01/04453 filed Apr. 2, 2001.
BACKGROUND OF THE INVENTION
The invention relates to a method of protecting an electronic entity including a microcircuit, in particular a microcircuit card with encrypted access, said protection being aimed more particularly at forms of attack known as “current analysis”. The invention also relates to an electronic entity including a microcircuit, in particular a microcircuit card with encrypted access, equipped with means for obtaining the protection offered by said method.
The person skilled in the art knows that some electronic entities with encrypted access, in particular microcircuit cards, are vulnerable to certain forms of attack based on analyzing certain parameters during a phase of their operation. It is said that information can “leak” from a computation carried out in said electronic entity (the card), typically the execution of a cryptographic protocol instigated by a fraudster in illegal possession of the card. The parameters analyzed during the execution of this kind of protocol can typically be computation time differences or differences in electromagnetic radiation during execution of the computation, but above all are the current consumed by the electronic entity itself during the execution of a cryptographic protocol.
Thus a standard attack consists in having the electronic entity that has fallen into the hands of the fraudster execute a certain number of cryptographic protocols based on random messages, which are therefore bound to fail, but cause the entity (the microcircuit card) to execute each time a cryptographic algorithm, for example the DES (DATA ENCRYPTION STANDARD) algorithm, and analyzing the current consumed during each execution of said DES algorithm. The object of this attack is to discover the secret key of said entity. The DES algorithm is very widely used at present in the field of bank cards, SIM (GSM) cards, pay per view television access cards, and access control cards.
In the case of fraud, i.e. when the fraudster has the card and is seeking to determine the key, the fraudster can connect said card to a reader by means of which he can transmit messages to it and connect it to means for recording the current consumed by the microcircuit during the execution of the operations that it carries out. The fraudster instigates multiple execution of the DES algorithm and the current consumption is detected and memorized each time. From all of this data, and in particular from the current consumption measurements, it is possible to mount attacks whose principle is well known. These SPA-DPA (Simple Power Analysis/Differential Power Analysis) attacks can reconstitute the key of the electronic entity.
In a paper presented on 17 Aug. 2000 at the CHES 2000 conference and published by SPRINGER under the N° 1965, the use of a battery integrated into the electronic entity to supply power to the microcircuit is envisaged. However, the author of the paper finishes by setting aside this solution, deeming it somewhat impractical and difficult to put into practice. The invention solves the problems referred to by the author of this paper.
SUMMARY OF THE INVENTION
To be more precise, the invention provides a method of protecting a microcircuit electronic entity such as a microcircuit card against current analysis attack, of the type consisting in associating with said microcircuit an energy store placed inside said entity, characterized in that, during an exchange of information in which said entity is coupled to a server adapted to provide it with an electrical power supply, at least a portion of said microcircuit is supplied with electrical power provided by said energy store during the execution of predetermined operations by said at least one portion of said microcircuit, said server supplying electrical power to said microcircuit during the execution of other operations.
The aforementioned energy store can be a battery, preferably a rechargeable battery. In this case, the battery can be charged on each transaction, i.e. each time that the electronic entity is coupled to a server capable of supplying to it the necessary electrical energy. The microcircuit is preferably designed and programmed to command charging of the battery outside time periods in which it is being used to supply power to the microcircuit or the portion of the microcircuit responsible for executing said predetermined operations. Instead of this, or in addition to this, said battery can be charged with solar energy by means of a photoelectric cell integrated into the electronic entity. In the current state of the art it is possible to envisage integrating into the thickness of a card at least one battery or rechargeable battery and also a photoelectric cell.
The aforementioned predetermined operations during which the microcircuit or a portion thereof is supplied with power internally and not by the server to which the electronic entity is connected (which could in fact be a device designed to break the secret codes of the card) are all exchanges of “sensitive” information, during which confidential data is exchanged. These operations are, for example, cryptographic algorithms during which keys are used or exchanged, the procedure for verifying the PIN, etc.
Alternatively, said predetermined operations can be executed by a coprocessor supplied with power by said battery while other operations are executed by a main processor supplied with power by said server. Another solution is to switch a main processor so that it is supplied with power by said battery while it is executing said predetermined “sensitive” operations, during which time periods said server supplies power to a decoy circuit, which continues to carry out operations and therefore to simulate consumption of current. However, the simulated current consumption is independent of the sensitive predetermined operations that are being executed at that time. This makes it impossible to recover sensitive data such as cryptographic keys, the PIN, etc. from a recording of the power supply current. Because the necessary current is being supplied by a battery or a rechargeable battery situated inside the electronic entity including the microcircuit, no information of interest relating to the operating status of the processor can “leak” out of the card, via the analysis of the current supplied by the server.
Even if the electronic entity is equipped with a simple non-rechargeable battery, the service life thereof is relatively long since said battery is used only to execute small program portions and not for all of the operations constituting a transaction between said electronic entity and the server. The use of a decoy or a coprocessor prevents an attacker from being able to determine the times at which the sensitive portions of the program are executed since, during those time intervals, the microcircuit continues to carry out operations, consuming current supplied by the external server.
The invention also provides an encrypted access electronic entity comprising a microcircuit and means for coupling the latter to a server itself provided with electrical power supply means for supplying power to said microcircuit via said coupling means, characterized in that it further includes an integrated energy store and selector means adapted to switch the power supply of at least a portion of said microcircuit to said energy store when predetermined operations are being executed by said at least one portion of said microcircuit.
In one embodiment, said selector means include a multiplexer or the like controlled by a processor of said microcircuit. The multiplexer has two inputs, one connected to a contact terminal for the connection to the electrical power supply means of said server and the other connected to said energy store. An output of said multiplexer is connected to an electrical power supply line of the processor. The processor commands the multiplexer to make the selection between the electrical power supply means of said server and said energy store integrated into said electronic entity.
The aforementioned contact terminal is one of the electrical contact regions that are usually found on the surface of a microcircuit card of the bank card or access control card type. However, some cards can be equipped with an antenna adapted to be coupled to an antenna situated in the server. The antenna system is used both for exchanging information and for supplying sufficient electrical energy to power the microcircuit. The invention also applies to this type of card, and in this case one of the inputs of the multiplexer is connected to a power supply circuit receiving its energy from the antenna integrated into the electronic entity (the card).
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be better understood and other advantages of the invention will become more clearly apparent in the light of the following description of embodiments of an electronic entity protected by implementing the concept explained hereinabove, which description is given by way of example only and with reference to the appended drawings, in which:
FIG. 1 is a diagrammatic view in section of a microcircuit card connected to a server and equipped with the improvement according to the invention;
FIG. 2 is a block diagram of a first embodiment of an electronic entity according to the invention;
FIG. 3 is a similar block diagram, showing another embodiment; and
FIG. 4 is another block diagram, showing a further embodiment.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring more particularly to FIG. 1, there is shown an electronic entity in the form of a microcircuit card 11 equipped with the improvement according to the invention and shown connected to a server 12 including an electrical power supply adapted to supply the electrical energy 13 necessary for the microcircuit housed in a cavity in the card to function. In the conventional way, the microcircuit 15 is accessible from the outside via a number of metal connection regions flush with the surface of the card. One of these regions constitutes a contact terminal 16 a connected to one pole of the power supply 13 via a rubbing contact member. Another connection region constitutes a contact terminal 16 b connected to the other pole of the power supply (connected to ground). The other connection regions enable exchange of information between the microcircuit and the server.
According to a noteworthy feature of the invention, a battery or a rechargeable battery 19 is accommodated within the thickness of the card. Moreover, the microcircuit includes selector means, for example essentially constituted of a multiplexer 20 or the like. The multiplexer is connected both to the contact terminal 16 a intended to be connected to the electrical power supply of the server 12 and to one pole of the battery 19 housed within the thickness of the card. The other pole of the battery is connected to ground.
FIG. 2 shows in more detail the general arrangement of the microcircuit 15 and its connection to one pole of the battery 19. In the FIG. 2 example, the microcircuit essentially consists of a processor P, a memory unit M, and a multiplexer 20 with two inputs and one output. In FIGS. 2 to 4, power supply electrical connections are shown in continuous line and control or information exchange connections are shown in dashed line. One input of the multiplexer is connected to the contact terminal 16 a and the other input is connected to one pole of the battery 19. The multiplexer constitutes selector means adapted to switch the power supply of at least one portion of the microcircuit 15, in this instance the whole of the processor P, to the integral battery 19 when predetermined operations are being executed by the processor. The predetermined operations in question are the sensitive operations defined hereinabove. The output of the multiplexer is connected to an electrical power supply line 22 of the processor. Moreover, the multiplexer (20) is controlled by the processor P (control connection 23) to select either the electrical power supply 13 of the server or the battery. In the FIG. 1 example, the battery 19 can be a simple non-rechargeable battery. The long service life of the battery is the result of the fact that it supplies power to the processor for only a small portion of the operating time of the card, i.e. when the latter is effecting sensitive operations. For all other operations, the processor is supplied with power by the power supply 13 of the server, via the contact terminal 16 a and the multiplexer 20, which is set accordingly by a control signal applied via the control connection 23. In the FIG. 3 embodiment, items analogous to those of FIG. 2 are identified by the same reference numbers. In this variant, the microcircuit further includes a circuit 25 for charging the battery 19, which is rechargeable. The charging circuit 25 is connected between the contact terminal 16 a and the battery 19. It is commanded by the processor P to recharge the battery when the processor is being supplied with power via the server, i.e. by the power supply 13. Advantageously, although this is not obligatory, the card also incorporates a photoelectric cell 27 connected to charge the battery 19. Here this photoelectric cell is connected to the charging circuit 25, which regulates the current, but it is not obligatory for selection of the photoelectric cell 27 to be controlled by the processor. The photoelectric cell can be connected to charge the battery at least partially when it receives sufficient illumination.
According to another advantageous feature, the microcircuit 15, and more particularly the microprocessor P, can include a decoy circuit 29 that is directly connected to the server coupling means, i.e. to the connection terminal 16 a. This decoy circuit is commanded to execute operations when the remainder of the microcircuit or at least the portion thereof which executes said predetermined operations is being supplied with power by the battery 19.
In a further embodiment, shown in FIG. 4, the microcircuit 15 includes a main processor P0 and a coprocessor P1. The latter is dedicated to the execution of said predetermined operations. Moreover, in this example, the multiplexer 20 a has two inputs and two outputs, forming a kind of double-pole switch, one of the switch poles being open when the other is closed, and vice-versa. The contact terminal 16 a is connected to one of the inputs and the corresponding output is connected to the electrical power supply line 22 a of the main processor. One of the terminals of the battery 19 is connected to the other input and the corresponding output is connected to the power supply line 22 b of the coprocessor P1. The main processor and the coprocessor are associated with a memory unit M. One of the two processors, for example the main processor, controls the selector means via a control connection 23. Thus the coprocessor is supplied with power only by the battery via the selector means.
Simplifying the FIG. 3 embodiment by connecting the power supply line 22 a of the processor P0 directly to the contact terminal 16 a can be envisaged. The multiplexer 20 a is then equivalent to a simple switch controlled by the processor P0. In this case, it is advantageous for the processor P0 to continue to execute operations (act as a decoy) when the coprocessor P1 is in service.

Claims (10)

1. An encrypted access electronic entity comprising:
a microcircuit for executing operations;
a connector interface for coupling said microcircuit to a server adapted to provide power to said microcircuit via said connector interface;
an integrated battery; and
a selector device to connect at least one portion of said microcircuit to said battery when predetermined operations are being executed by said at least one portion of said microcircuit,
wherein said microcircuit comprises a processor and said selector device includes a multiplexer controlled by said processor, said multiplexer having two inputs, one of which is connected to said connector interface and the other of which is connected to said battery, an output of said multiplexer being connected to an electrical power supply input of said processor, and wherein said multiplexer is commanded by said processor to selectively connect said output to one or the other of said inputs.
2. The electronic entity according to claim 1, wherein said battery is rechargeable, and further comprising a charging circuit for charging said battery, said charging circuit being connected between said connector interface and said battery and said charging circuit being commanded by said microcircuit to charge said battery when said microcircuit is coupled by said connector interface to said server.
3. The electronic entity according to claim 2, further including a photoelectric cell connected to at least partially charge said battery.
4. The electronic entity according to claim 3, wherein said photoelectric cell is connected to said charging circuit.
5. The electronic entity according to claim 1, wherein said processor includes a main processor and a coprocessor dedicated to execution of said predetermined operations, said coprocessor being supplied with power by said battery via said selector device.
6. The electronic entity according to claim 5, wherein the coprocessor is only supplied with power from said battery.
7. The electronic entity according to claim 1, wherein said microcircuit includes, in addition to said at least a portion of said microcircuit, a decoy circuit connected to said connector interface so as to be supplied with power from said server, said decoy circuit being commanded to execute operations when said at least one portion of said microcircuit is being supplied with power by said battery for execution of said predetermined operations.
8. The electronic entity according to claim 7, wherein said processor comprises said decoy circuit and a coprocessor comprising the at least a portion of said microcircuit which is powered by said battery.
9. The electronic entity according to claim 1, wherein the battery is rechargeable, and the entity includes a photoelectric cell connected to at least partially charge said battery.
10. The electronic entity according to claim 1, wherein said electronic entity is a microcircuit card.
US10/473,815 2001-04-02 2002-03-27 Methods for protecting a smart card Expired - Lifetime US7219844B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR01/04453 2001-04-02
FR0104453A FR2822988B1 (en) 2001-04-02 2001-04-02 METHOD FOR PROTECTING AN ELECTRONIC ENTITY WITH A MICROCIRCUIT AND ELECTRONIC ENTITY PROVIDED WITH SUCH PROTECTION
PCT/FR2002/001058 WO2002080094A1 (en) 2001-04-02 2002-03-27 Method for protecting a smart card

Publications (2)

Publication Number Publication Date
US20040145339A1 US20040145339A1 (en) 2004-07-29
US7219844B2 true US7219844B2 (en) 2007-05-22

Family

ID=8861838

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/473,815 Expired - Lifetime US7219844B2 (en) 2001-04-02 2002-03-27 Methods for protecting a smart card

Country Status (6)

Country Link
US (1) US7219844B2 (en)
EP (1) EP1374160B1 (en)
AT (1) ATE491189T1 (en)
DE (1) DE60238522D1 (en)
FR (1) FR2822988B1 (en)
WO (1) WO2002080094A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060056622A1 (en) * 2004-09-15 2006-03-16 Stmicroelectronics S.A. Protection of a DES algorithm
US10243088B1 (en) * 2017-12-21 2019-03-26 Capital One Services, Llc Transaction card for transferring solar power

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2874440B1 (en) * 2004-08-17 2008-04-25 Oberthur Card Syst Sa METHOD AND DEVICE FOR PROCESSING DATA
EP2000936A1 (en) * 2007-05-29 2008-12-10 Gemplus Electronic token comprising several microprocessors and method of managing command execution on several microprocessors
EP2164053A1 (en) * 2008-09-11 2010-03-17 Gemplus Standalone counterattack method in response to one or several physical aggressions, and associated device
WO2012133966A1 (en) * 2011-03-31 2012-10-04 한양대학교 산학협력단 Apparatus safe from power consumption analysis attack for encrypting and method for operating same
US8413906B2 (en) 2011-05-22 2013-04-09 King Saud University Countermeasures to secure smart cards
FR3026206B1 (en) * 2014-09-23 2017-12-01 Inside Secure METHOD OF CONTREPOSING AGAINST ATTACK BY ELECTRICAL CONSUMPTION ANALYSIS FOR CRYPTOGRAPHIC DEVICE
FR3081241B1 (en) 2018-05-17 2020-05-29 Stmicroelectronics (Rousset) Sas METHOD FOR MANAGING THE VALUE OF THE SUPPLY VOLTAGE OF A MODULE OF AN INTEGRATED CIRCUIT, AND ASSOCIATED INTEGRATED CIRCUIT

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4575621A (en) * 1984-03-07 1986-03-11 Corpra Research, Inc. Portable electronic transaction device and system therefor
FR2616941A1 (en) 1987-06-22 1988-12-23 Photowatt Int Credit card type electronic card
US4843224A (en) * 1987-06-12 1989-06-27 Oki Electric Industry Co., Ltd. IC card
US4985921A (en) * 1988-04-11 1991-01-15 Spa Syspatronic Ag Portable data carrying device
DE19911673A1 (en) 1999-03-09 2000-09-14 Deutsche Telekom Ag Method and arrangement for protecting data on a smart card
FR2793904A1 (en) 1999-05-21 2000-11-24 St Microelectronics Sa Control of the current taken by an electronic circuit used in reading the security code from a device such as a bankers card of portable telephone to mask the period during which the code is read, but to reduce the masking period
WO2001008088A1 (en) 1999-07-22 2001-02-01 Schlumberger Systemes Secure microcontroller against attacks based on current consumption values
US20020014537A1 (en) * 1998-04-17 2002-02-07 Manabu Obana IC card having memory contents transfer control unit and method of storing data in IC card
US6507913B1 (en) * 1999-12-30 2003-01-14 Yeda Research And Development Co. Ltd. Protecting smart cards from power analysis with detachable power supplies
US6561430B2 (en) * 2001-01-10 2003-05-13 Chi-Yuan Ou IC card with display screen

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0732542B2 (en) * 1987-11-16 1995-04-10 シャープ株式会社 Charging method for secondary battery in IC card

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4575621A (en) * 1984-03-07 1986-03-11 Corpra Research, Inc. Portable electronic transaction device and system therefor
US4843224A (en) * 1987-06-12 1989-06-27 Oki Electric Industry Co., Ltd. IC card
FR2616941A1 (en) 1987-06-22 1988-12-23 Photowatt Int Credit card type electronic card
US4985921A (en) * 1988-04-11 1991-01-15 Spa Syspatronic Ag Portable data carrying device
US20020014537A1 (en) * 1998-04-17 2002-02-07 Manabu Obana IC card having memory contents transfer control unit and method of storing data in IC card
DE19911673A1 (en) 1999-03-09 2000-09-14 Deutsche Telekom Ag Method and arrangement for protecting data on a smart card
FR2793904A1 (en) 1999-05-21 2000-11-24 St Microelectronics Sa Control of the current taken by an electronic circuit used in reading the security code from a device such as a bankers card of portable telephone to mask the period during which the code is read, but to reduce the masking period
WO2001008088A1 (en) 1999-07-22 2001-02-01 Schlumberger Systemes Secure microcontroller against attacks based on current consumption values
US6507913B1 (en) * 1999-12-30 2003-01-14 Yeda Research And Development Co. Ltd. Protecting smart cards from power analysis with detachable power supplies
US6561430B2 (en) * 2001-01-10 2003-05-13 Chi-Yuan Ou IC card with display screen

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060056622A1 (en) * 2004-09-15 2006-03-16 Stmicroelectronics S.A. Protection of a DES algorithm
US7764786B2 (en) * 2004-09-15 2010-07-27 Stmicroelectronics S.A. Protection of a DES algorithm
US10243088B1 (en) * 2017-12-21 2019-03-26 Capital One Services, Llc Transaction card for transferring solar power
US10930801B2 (en) 2017-12-21 2021-02-23 Capital One Services, Llc Transaction card for transferring solar power

Also Published As

Publication number Publication date
FR2822988B1 (en) 2003-08-15
EP1374160B1 (en) 2010-12-08
ATE491189T1 (en) 2010-12-15
US20040145339A1 (en) 2004-07-29
WO2002080094A1 (en) 2002-10-10
DE60238522D1 (en) 2011-01-20
FR2822988A1 (en) 2002-10-04
EP1374160A1 (en) 2004-01-02

Similar Documents

Publication Publication Date Title
US10387871B2 (en) Integration of verification tokens with mobile communication devices
US7802098B2 (en) Cryptography method and smart cards microcircuit
US10846683B2 (en) Integration of verification tokens with mobile communication devices
US8690060B2 (en) Electronic payment terminal
Abraham et al. Transaction security system
CN102547682B (en) Control protected built-in function and the method and apparatus of application in microcircuit card
US7845567B2 (en) Contactless card reader and information processing system
JP7332087B2 (en) Systems and methods for signing transactions using air-gapped private keys
US20060192020A1 (en) IC-card service period setting method, IC card, IC card case and battery charger
US9799180B1 (en) Multiplexed tamper detection system
US7219844B2 (en) Methods for protecting a smart card
CN105761067A (en) Intelligent pos machine security module and starting method thereof
Van Damme et al. Offline NFC payments with electronic vouchers
Ortiz-Yepes A review of technical approaches to realizing near-field communication mobile payments
Leng Smart card applications and security
CN107545431A (en) Transaction authorisation method and system and method for commerce and system
KR20030083865A (en) A system for an electronic account by off-line using mobile-phone inside combi-type smartcard
CN205540909U (en) Intelligence POS machine security module
RU2788153C2 (en) System and method for signing transactions, using closed keys disconnected from network
KR20030083866A (en) A method for an electronic account by off-line using mobile-phone inside combi-type smartcard
Grand et al. Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices
KR19990038700A (en) Multi smart card using Java chip
KR20030083403A (en) A method for an electronic account by on-line using mobile-phone inside combi-type smartcard
Kevin Crypto-SmartLock: Applying Cryptography to Physical Security
CN107545432A (en) Transaction authorisation method and system and method for commerce and system

Legal Events

Date Code Title Description
AS Assignment

Owner name: OBERTHUR CARD SYSTEMS SA, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DISCHAMP, PAUL;REEL/FRAME:014434/0844

Effective date: 20031002

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12